Category

Portfast: With conventional STP operation a laptop computer after booting have to wait at least 30 secs ( fifteen listening ,fifteen learning ) for transmit and or receive data . Portfast facilitate the laptop computer to be online going past the listening & learning state of switch port . To configure the PortFast in Switch [...]

The significant benefits of VLAN are listed below . • Broadcast Control : Broadcasts are needed for the regularly function of a network . Many protocols and application rely on broadcast communication to function properly . A layer 2 switched network is basically in a single broadcast domain and the broadcasts can reach the network [...]

Cisco switches support two frame tagging protocols: Inter-Switch Link (ISL) IEEE 802.1Q Inter-Switch Link (ISL) It is Cisco’s proprietary frame tagging protocol. It encapsulates a frame with an additional header (26 bytes) and trailer (4bytes). It increases the size of a frame by 30 bytes. The header contains several fields, including a 15-bit VLAN ID. [...]

Switching Modes 1. Store and Forward Switching 2. Cut-through Switching 3. Fragment-Free Switching 1. Store and Forward Switching Switch copies each complete frame into the switch memory and do a Cyclic Redundancy Check (CRC) for errors. If an error is found, the frame is dropped and if there is no error, the switch forwards the [...]

Yes, OSPF can authenticate all packets exchanged between neighbors. Authentication may be through simple passwords or through MD5 cryptographic checksums. To configure simple password authentication for an area, use the command ip ospf authentication-key to assign a password of up to eight octets to each interface attached to the area. Then, issue the area x [...]

Route Distinguisher We know VRFs allow IP address space to be reused among isolated routing domains. For example, assume you have to connect to three customer sites, all of which are using 192.168.10.0/24 as their local network. We can assign each customer its own VRF so that the overlapping networks are kept isolated from one [...]

When BGP is not behaving correctly, a “trick” to temporarily stop peering with a neighbor is to use the following command: router bgp 194 neighbor<ipaddress> password xxx Since the other router doesn’t have the same password, the two routers will stop talking to one another, without you having to do anything else. Later, when the [...]

The F2 still provide all the built-in features of F1 line card. It actually take the operation further to provide better bandwidth. Currently, the F2 card will give wire-rate speed. This means that 48 port populated with 10G links will run in non-blocking architecture. Something new that was not possible in the older line cards, [...]

The main difference is that the M1 cards will do major and all Layer 3 related features and operations. The M2 cards will give the data center the expansion to run 40G and 100G infrastructure. The initial series of line cards launched by cisco for Nexus 7000 series switches were M1 and F1. M1 series [...]

we already know that the purpose of ARP requests in the network is to give the device an appropriate mapping of MAC address to IP address. So, How does an ARP attack works? ARP attack is done through ARP spoofing, where it is done by modifying the ARP tables which are small databases linking to [...]

How Switch Chassis looks like? Voltage Failure Voltage Termination (VTT) module terminates signals on the Catalyst switching bus. There are three voltage regulators (VTT) in the backplane. If one VTT module fails, it is a minor alarm. If two fail, there is a major problem and the corrective action shuts down the system. Example Command [...]

A transit AS is an AS that routes traffic from one external AS to another external AS The “show ip bgp” command is used to display entries in the BGP routing table. The AS-PATH attribute is used to prevent BGP routing loops. When receiving an BGP advertisement, the router checks the AS-PATH attribute, [...]

Passive-interface command is used in all routing protocols to disable sending updates out from a specific interface. However the command behavior varies from o­ne protocol to another. RIP: In RIP this command will disable sending multicast updates via a specific interface but will allow listening to incoming updates from other RIP enabled neighbors.This simply means [...]

EIGRP is a Cisco proprietary protocol which means it will work only on Cisco routers. EIGRP is also called advanced distance vector or Hybrid routing protocol. Multicast or unicast is used for exchange of information. Multiple network layer protocols are supported. 100% loop-free. By default,EIGRP will limit itself to use no more than 50% of [...]

The multi-VLAN port is a feature which allows switch for configuring a single port for two or more vlans. This feature allows users from different VLANs to access a server or router without implementing InterVLAN routing capability. A multi-VLAN port performs normal switching functions in all its assigned VLANs. Multi-VLAN port will not work when [...]

When Open Shortest Path First (OSPF) is enabled on a router or when a router configured for OSPF is powered up, it tries to discover its OSPF neighbors and synchronize its database with them. Routers are said to be OSPF neighbors when they see their router ID in the received hello packet and the status [...]

Introduction: Policy-Based Routing (PBR) provides a method to forward packets by overriding the information available in the IP routing table. By using PBR, customers can implement policies that selectively cause packets to take different paths. Traditional IP routing forwards packets based only on the destination IP address in the packet. PBR can be configured to [...]

The rollback feature allows you to take a snapshot, or user checkpoint, of the Cisco NX-OS configuration and then reapply that configuration to your device at any point without having to reload the device. This checkpoint can be extremely useful when a new change is being tested and want immediate return to an original/stable configuration [...]

Two different VTP domains cannot exchange VLAN database information. In fact, splitting a switched network into more VTP domains is one of the few ways how to make one part of the network independent from another with respect to VTP. If two switches are supposed to synchronise their VLAN databases via VTP, they must be [...]

Routing policies for a peer include all the configurations such as route-map, distribute-list, prefix-list, & filter-list that may impact inbound or outbound routing table updates. Whenever there is a change in the routing policy, the BGP session must be cleared, or reset, for the new policy to take effect. There are two types of reset, [...]

Yes the Enhanced Interior Gateway Routing Protocol (EIGRP) supports secondary addresses. However, because EIGRP supply data packets from the primary address, all the routers should be configured with the primary addresses that belong on the same subnet. Be sure that the primary address on the interface is configured for EIGRP by issuing the network command [...]

The DNS protocol is used to resolve FQDN (Fully Qualified Domain Names) to IP addresses worldwide. This allows us to successfully find and connect to Internet websites and services no matter where they are. Its usefulness, however, doesn’t stop there: local company and private networks also rely on DNS to operate efficiently and correctly. In [...]

In BGP it is a component that is used to modify the admin distance of eBGP in order for an interior portal routing protocol (IGP) to take precedence over an eBGP route. By default,External BGP (eBGP) has an admin distance value of 20. Administrative distance is the first criterion that a router uses to determine [...]

By default EIGRP limits itself to using no more than 50% of the interface bandwidth. Although, this is not very significance on high speeds like on Ethernet, it becomes critical on low speed links, especially on Nonbroadcast Multiaccess Address (NBMA) networks like Frame Relay. If the interface bandwidth configuration cannot be changed because of routing [...]

The ErrDisable feature is implemented to handle critical situations where the switch detected excessive or late collisions on a port, port duplex misconfiguration, Ether Channel misconfiguration, Bridge Protocol Data Unit (BPDU) port-guard violation, UniDirectional Link Detection (UDLD), and other causes. The error-disable function let the switch to shut down a port when it encounters physical, [...]

The Open Shortest Path First (OSPF) neighbors are established by exchanging hello packets at multicast address 224.0.0.5. If these packets fail due to any Layer 2 (L2) issue, OSPF neighbors flap. This results in the error message ‘OSPF-5-ADJCHG’ To resolve this issue, ensure that the underlying L2 between OSPF neighbors is working properly by issuing [...]

On the 3850 switches has embedded wireshark that can be used to packet capture during the troubleshooting this negate the need of SPAN to capture the traffic. -Define your source monitor capture mycap interface GigabitEthernet1/0/1 both -Set your match statement monitor capture mycap access-list myacl monitor capture mycap match ipv4 any any -Set your destination [...]

Configuring distribute-list commands that utilize route maps will not achieve desired Link State Advertisement (LSA) filtering. Open Shortest Path First Protocol (OSPF) routes cannot be filtered from entering the OSPF database using distribute-list. The distribute-list in command only filters routes from entering the routing table, and it does not prevent LSA packets from being propagated. [...]

In router you can choose to manually set the ‘passive-interface’ command on the interfaces where adjacency is not desired. The interface address that you specify as passive appears as a stub network in the OSPF domain. OSPF routing information is neither sent nor received through the specified device interface. Passive interface can be configured in [...]

The Virtual Switching System (VSS) is a clustering technology that combines two Cisco Catalyst 4500 or 6500 Series into a single virtual switch. In a VSS, the data plane of both clustered switches is active at the same time in both chassis. VSS members are connected by virtual switch links (VSLs) using standard Gigabit or [...]

If a static route is configured for the network to the null0 interface, the packets will be dropped without the ICMP message or without having to configure an access list to block/deny traffic. This interface is always up and can never forward or receive traffic and any encapsulation will always fail. The null interface provides [...]

To check the connectivity we can use the IP SLA feature in Cisco IOS which will be constantly pinging the internet address as soon as the icmp check will fail it will change the priority of the route so the traffic will get out through the other link. First we create our IP SLA cinfig. [...]